Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which two components reduce the attack surface on an endpoint? (Choose two.)

A.

secure boot

B.

load balancing

C.

increased audit log levels

D.

restricting USB ports

E.

full packet captures at the endpoint

Which type of access control depends on the job function of the user?

A.

discretionary access control

B.

nondiscretionary access control

C.

role-based access control

D.

rule-based access control

What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?

A.

Tapping interrogation replicates signals to a separate port for analyzing traffic

B.

Tapping interrogations detect and block malicious traffic

C.

Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies

D.

Inline interrogation detects malicious traffic but does not block the traffic

What is the difference between deep packet inspection and stateful inspection?

A.

Deep packet inspection gives insights up to Layer 7, and stateful inspection gives insights only up to Layer 4.

B.

Deep packet inspection is more secure due to its complex signatures, and stateful inspection requires less human intervention.

C.

Stateful inspection is more secure due to its complex signatures, and deep packet inspection requires less human intervention.

D.

Stateful inspection verifies data at the transport layer and deep packet inspection verifies data at the application layer

Which filter allows an engineer to filter traffic in Wireshark to further analyze the PCAP file by only showing the traffic for LAN 10.11.x.x, between workstations and servers without the Internet?

A.

src=10.11.0.0/16 and dst=10.11.0.0/16

B.

ip.src==10.11.0.0/16 and ip.dst==10.11.0.0/16

C.

ip.src=10.11.0.0/16 and ip.dst=10.11.0.0/16

D.

src==10.11.0.0/16 and dst==10.11.0.0/16

If a web server accepts input from the user and passes it to a bash shell, to which attack method is it vulnerable?

A.

input validation

B.

hash collision

C.

integer overflow

D.

command injection

An analyst received a ticket regarding a degraded processing capability for one of the HR department's servers. On the same day, an engineer noticed a disabled antivirus software and was not able to determine when or why it occurred. According to the NIST Incident Handling Guide, what is the next phase of this investigation?

A.

Recovery

B.

Detection

C.

Eradication

D.

Analysis

What makes HTTPS traffic difficult to monitor?

A.

SSL interception

B.

packet header size

C.

signature detection time

D.

encryption

A malicious file has been identified in a sandbox analysis tool.

Which piece of information is needed to search for additional downloads of this file by other hosts?

A.

file header type

B.

file size

C.

file name

D.

file hash value

Refer to the exhibit.

Which event is occurring?

A.

A binary named "submit" is running on VM cuckoo1.

B.

A binary is being submitted to run on VM cuckoo1

C.

A binary on VM cuckoo1 is being submitted for evaluation

D.

A URL is being evaluated to see if it has a malicious binary